key.py 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197
  1. import getpass
  2. import os
  3. import re
  4. import shutil
  5. import tempfile
  6. from binascii import hexlify, unhexlify
  7. import pytest
  8. from ..crypto import bytes_to_long, num_aes_blocks
  9. from ..key import PlaintextKey, PassphraseKey, KeyfileKey, Passphrase, PasswordRetriesExceeded, bin_to_hex
  10. from ..helpers import Location, Chunk, IntegrityError
  11. @pytest.fixture(autouse=True)
  12. def clean_env(monkeypatch):
  13. # Workaround for some tests (testsuite/archiver) polluting the environment
  14. monkeypatch.delenv('BORG_PASSPHRASE', False)
  15. class TestKey:
  16. class MockArgs:
  17. location = Location(tempfile.mkstemp()[1])
  18. keyfile2_key_file = """
  19. BORG_KEY 0000000000000000000000000000000000000000000000000000000000000000
  20. hqppdGVyYXRpb25zzgABhqCkaGFzaNoAIMyonNI+7Cjv0qHi0AOBM6bLGxACJhfgzVD2oq
  21. bIS9SFqWFsZ29yaXRobaZzaGEyNTakc2FsdNoAINNK5qqJc1JWSUjACwFEWGTdM7Nd0a5l
  22. 1uBGPEb+9XM9p3ZlcnNpb24BpGRhdGHaANAYDT5yfPpU099oBJwMomsxouKyx/OG4QIXK2
  23. hQCG2L2L/9PUu4WIuKvGrsXoP7syemujNfcZws5jLp2UPva4PkQhQsrF1RYDEMLh2eF9Ol
  24. rwtkThq1tnh7KjWMG9Ijt7/aoQtq0zDYP/xaFF8XXSJxiyP5zjH5+spB6RL0oQHvbsliSh
  25. /cXJq7jrqmrJ1phd6dg4SHAM/i+hubadZoS6m25OQzYAW09wZD/phG8OVa698Z5ed3HTaT
  26. SmrtgJL3EoOKgUI9d6BLE4dJdBqntifo""".strip()
  27. keyfile2_cdata = unhexlify(re.sub('\W', '', """
  28. 0055f161493fcfc16276e8c31493c4641e1eb19a79d0326fad0291e5a9c98e5933
  29. 00000000000003e8d21eaf9b86c297a8cd56432e1915bb
  30. """))
  31. keyfile2_id = unhexlify('c3fbf14bc001ebcc3cd86e696c13482ed071740927cd7cbe1b01b4bfcee49314')
  32. @pytest.fixture
  33. def keys_dir(self, request, monkeypatch, tmpdir):
  34. monkeypatch.setenv('BORG_KEYS_DIR', tmpdir)
  35. return tmpdir
  36. class MockRepository:
  37. class _Location:
  38. orig = '/some/place'
  39. _location = _Location()
  40. id = bytes(32)
  41. id_str = bin_to_hex(id)
  42. def test_plaintext(self):
  43. key = PlaintextKey.create(None, None)
  44. chunk = Chunk(b'foo')
  45. assert hexlify(key.id_hash(chunk.data)) == b'2c26b46b68ffc68ff99b453c1d30413413422d706483bfa0f98a5e886266e7ae'
  46. assert chunk == key.decrypt(key.id_hash(chunk.data), key.encrypt(chunk))
  47. def test_keyfile(self, monkeypatch, keys_dir):
  48. monkeypatch.setenv('BORG_PASSPHRASE', 'test')
  49. key = KeyfileKey.create(self.MockRepository(), self.MockArgs())
  50. assert bytes_to_long(key.enc_cipher.iv, 8) == 0
  51. manifest = key.encrypt(Chunk(b'XXX'))
  52. assert key.extract_nonce(manifest) == 0
  53. manifest2 = key.encrypt(Chunk(b'XXX'))
  54. assert manifest != manifest2
  55. assert key.decrypt(None, manifest) == key.decrypt(None, manifest2)
  56. assert key.extract_nonce(manifest2) == 1
  57. iv = key.extract_nonce(manifest)
  58. key2 = KeyfileKey.detect(self.MockRepository(), manifest)
  59. assert bytes_to_long(key2.enc_cipher.iv, 8) == iv + num_aes_blocks(len(manifest) - KeyfileKey.PAYLOAD_OVERHEAD)
  60. # Key data sanity check
  61. assert len({key2.id_key, key2.enc_key, key2.enc_hmac_key}) == 3
  62. assert key2.chunk_seed != 0
  63. chunk = Chunk(b'foo')
  64. assert chunk == key2.decrypt(key.id_hash(chunk.data), key.encrypt(chunk))
  65. def test_keyfile_kfenv(self, tmpdir, monkeypatch):
  66. keyfile = tmpdir.join('keyfile')
  67. monkeypatch.setenv('BORG_KEY_FILE', str(keyfile))
  68. monkeypatch.setenv('BORG_PASSPHRASE', 'testkf')
  69. assert not keyfile.exists()
  70. key = KeyfileKey.create(self.MockRepository(), self.MockArgs())
  71. assert keyfile.exists()
  72. chunk = Chunk(b'XXX')
  73. chunk_id = key.id_hash(chunk.data)
  74. chunk_cdata = key.encrypt(chunk)
  75. key = KeyfileKey.detect(self.MockRepository(), chunk_cdata)
  76. assert chunk == key.decrypt(chunk_id, chunk_cdata)
  77. keyfile.remove()
  78. with pytest.raises(FileNotFoundError):
  79. KeyfileKey.detect(self.MockRepository(), chunk_cdata)
  80. def test_keyfile2(self, monkeypatch, keys_dir):
  81. with keys_dir.join('keyfile').open('w') as fd:
  82. fd.write(self.keyfile2_key_file)
  83. monkeypatch.setenv('BORG_PASSPHRASE', 'passphrase')
  84. key = KeyfileKey.detect(self.MockRepository(), self.keyfile2_cdata)
  85. assert key.decrypt(self.keyfile2_id, self.keyfile2_cdata).data == b'payload'
  86. def test_keyfile2_kfenv(self, tmpdir, monkeypatch):
  87. keyfile = tmpdir.join('keyfile')
  88. with keyfile.open('w') as fd:
  89. fd.write(self.keyfile2_key_file)
  90. monkeypatch.setenv('BORG_KEY_FILE', str(keyfile))
  91. monkeypatch.setenv('BORG_PASSPHRASE', 'passphrase')
  92. key = KeyfileKey.detect(self.MockRepository(), self.keyfile2_cdata)
  93. assert key.decrypt(self.keyfile2_id, self.keyfile2_cdata).data == b'payload'
  94. def test_passphrase(self, keys_dir, monkeypatch):
  95. monkeypatch.setenv('BORG_PASSPHRASE', 'test')
  96. key = PassphraseKey.create(self.MockRepository(), None)
  97. assert bytes_to_long(key.enc_cipher.iv, 8) == 0
  98. assert hexlify(key.id_key) == b'793b0717f9d8fb01c751a487e9b827897ceea62409870600013fbc6b4d8d7ca6'
  99. assert hexlify(key.enc_hmac_key) == b'b885a05d329a086627412a6142aaeb9f6c54ab7950f996dd65587251f6bc0901'
  100. assert hexlify(key.enc_key) == b'2ff3654c6daf7381dbbe718d2b20b4f1ea1e34caa6cc65f6bb3ac376b93fed2a'
  101. assert key.chunk_seed == -775740477
  102. manifest = key.encrypt(Chunk(b'XXX'))
  103. assert key.extract_nonce(manifest) == 0
  104. manifest2 = key.encrypt(Chunk(b'XXX'))
  105. assert manifest != manifest2
  106. assert key.decrypt(None, manifest) == key.decrypt(None, manifest2)
  107. assert key.extract_nonce(manifest2) == 1
  108. iv = key.extract_nonce(manifest)
  109. key2 = PassphraseKey.detect(self.MockRepository(), manifest)
  110. assert bytes_to_long(key2.enc_cipher.iv, 8) == iv + num_aes_blocks(len(manifest) - PassphraseKey.PAYLOAD_OVERHEAD)
  111. assert key.id_key == key2.id_key
  112. assert key.enc_hmac_key == key2.enc_hmac_key
  113. assert key.enc_key == key2.enc_key
  114. assert key.chunk_seed == key2.chunk_seed
  115. chunk = Chunk(b'foo')
  116. assert hexlify(key.id_hash(chunk.data)) == b'818217cf07d37efad3860766dcdf1d21e401650fed2d76ed1d797d3aae925990'
  117. assert chunk == key2.decrypt(key2.id_hash(chunk.data), key.encrypt(chunk))
  118. def _corrupt_byte(self, key, data, offset):
  119. data = bytearray(data)
  120. data[offset] += 1
  121. with pytest.raises(IntegrityError):
  122. key.decrypt("", data)
  123. def test_decrypt_integrity(self, monkeypatch, keys_dir):
  124. with keys_dir.join('keyfile').open('w') as fd:
  125. fd.write(self.keyfile2_key_file)
  126. monkeypatch.setenv('BORG_PASSPHRASE', 'passphrase')
  127. key = KeyfileKey.detect(self.MockRepository(), self.keyfile2_cdata)
  128. data = self.keyfile2_cdata
  129. for i in range(len(data)):
  130. self._corrupt_byte(key, data, i)
  131. with pytest.raises(IntegrityError):
  132. data = bytearray(self.keyfile2_cdata)
  133. id = bytearray(key.id_hash(data)) # corrupt chunk id
  134. id[12] = 0
  135. key.decrypt(id, data)
  136. class TestPassphrase:
  137. def test_passphrase_new_verification(self, capsys, monkeypatch):
  138. monkeypatch.setattr(getpass, 'getpass', lambda prompt: "12aöäü")
  139. monkeypatch.setenv('BORG_DISPLAY_PASSPHRASE', 'no')
  140. Passphrase.new()
  141. out, err = capsys.readouterr()
  142. assert "12" not in out
  143. assert "12" not in err
  144. monkeypatch.setenv('BORG_DISPLAY_PASSPHRASE', 'yes')
  145. passphrase = Passphrase.new()
  146. out, err = capsys.readouterr()
  147. assert "313261c3b6c3a4c3bc" not in out
  148. assert "313261c3b6c3a4c3bc" in err
  149. assert passphrase == "12aöäü"
  150. monkeypatch.setattr(getpass, 'getpass', lambda prompt: "1234/@=")
  151. Passphrase.new()
  152. out, err = capsys.readouterr()
  153. assert "1234/@=" not in out
  154. assert "1234/@=" in err
  155. def test_passphrase_new_empty(self, capsys, monkeypatch):
  156. monkeypatch.delenv('BORG_PASSPHRASE', False)
  157. monkeypatch.setattr(getpass, 'getpass', lambda prompt: "")
  158. with pytest.raises(PasswordRetriesExceeded):
  159. Passphrase.new(allow_empty=False)
  160. out, err = capsys.readouterr()
  161. assert "must not be blank" in err
  162. def test_passphrase_new_retries(self, monkeypatch):
  163. monkeypatch.delenv('BORG_PASSPHRASE', False)
  164. ascending_numbers = iter(range(20))
  165. monkeypatch.setattr(getpass, 'getpass', lambda prompt: str(next(ascending_numbers)))
  166. with pytest.raises(PasswordRetriesExceeded):
  167. Passphrase.new()
  168. def test_passphrase_repr(self):
  169. assert "secret" not in repr(Passphrase("secret"))